Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
Status: Free TrialSkills you'll gain:
Status: Free TrialSkills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
Status: Free TrialSkills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
Status: Free TrialRoyal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Status: Free TrialKennesaw State University
Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
Status: Free TrialInfosec
Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership
Status: Free TrialKennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
Status: Free TrialUniversity of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Status: Free TrialSkills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Status: Free TrialSkills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Status: Free TrialSkills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Status: Free TrialPalo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Enterprise Security, Incident Response, Malware Protection, Automation, Artificial Intelligence
In summary, here are 10 of our most popular security strategy courses
- Information Technology and Security Principles: Packt
- Cryptography, Network Security, and Application Security: Packt
- Cybersecurity Concepts: Packt
- Security Management and Governance: Royal Holloway, University of London
- Implementing a Risk Management Framework : Kennesaw State University
- Leadership: Infosec
- Cybersecurity Foundations for Risk Management: Kennesaw State University
- Security Governance & Compliance: University of California, Irvine
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- System Hacking, Malware Threats, and Network Attacks: Packt










